Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions

被引:3
|
作者
Roettger, Eric [1 ]
Williams, Hugh C. [2 ]
机构
[1] Mt Royal Univ, Dept Gen Educ, Calgary, AB, Canada
[2] Univ Calgary, Dept Math & Stat, Calgary, AB T2N 1N4, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
linear recurrence; Lucas functions; public-key; cryptography;
D O I
10.3233/FI-2012-633
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
One of the goals of public-key cryptography is to securely exchange a key by use of a public channel without the users previously communicating with one another. In 1976 W. Diffie and M. Hellman had an idea how to do this by exploiting mathematically difficult one-way problems. Diffie-Hellman key exchange is based on the believed difficulty of the discrete log problem. This paper presents a new key exchange protocol based on functions that were developed to generalize the Lucas functions. Relevant results about this generalization of the Lucas functions are provided that provide the machinery for the Diffie-Hellman-like key exchange presented here. Lastly, there is a brief discussion about the efficiency of our system versus Diffie-Hellman key exchange and LUCDIF.
引用
收藏
页码:325 / 344
页数:20
相关论文
共 50 条
  • [1] Hardware-Based Public-Key Cryptography with Public Physically Unclonable Functions
    Beckmann, Nathan
    Potkonjak, Miodrag
    INFORMATION HIDING, 2009, 5806 : 206 - +
  • [2] PUBLIC-KEY CRYPTOGRAPHY
    ODLYZKO, AM
    AT&T TECHNICAL JOURNAL, 1994, 73 (05): : 17 - 23
  • [3] RFID privacy based on public-key cryptography
    Vaudenay, Serge
    Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 1 - 6
  • [4] THE ADOLESCENCE OF PUBLIC-KEY CRYPTOGRAPHY
    DIFFIE, W
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 434 : 2 - 2
  • [5] MATHEMATICS OF PUBLIC-KEY CRYPTOGRAPHY
    HELLMAN, ME
    SCIENTIFIC AMERICAN, 1979, 241 (02) : 146 - &
  • [6] Public-key cryptography and availability
    Stabell-Kulo, T
    Lupetti, S
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, PROCEEDINGS, 2005, 3688 : 222 - 232
  • [7] UNTANGLING PUBLIC-KEY - CRYPTOGRAPHY
    SCHNEIER, B
    DR DOBBS JOURNAL, 1992, 17 (05): : 16 - &
  • [8] NONINTERACTIVE PUBLIC-KEY CRYPTOGRAPHY
    MAURER, UM
    YACOBI, Y
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 498 - 507
  • [9] A Petri net based public-key cryptography: PNPKC
    Ge, QW
    Okamoto, T
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (06): : 1532 - 1535
  • [10] Public-Key Cryptography Based on Tropical Circular Matrices
    Huang, Huawei
    Li, Chunhua
    Deng, Lunzhi
    APPLIED SCIENCES-BASEL, 2022, 12 (15):